VM-Series is the virtualized form factor of the Palo Alto Networks next-generation firewall. To meet the growing need for inline security across diverse cloud and virtualization use cases, you can deploy the VM-Series firewall on a wide range of private and public cloud computing environments such as VMware, Cisco ACI and ENCS, KVM, OpenStack, Amazon Web Services, Microsoft public and private cloud, OCI, and Google Cloud Platform.

What's New

Highlights

Support for Oracle Cloud Infrastructure (OCI)

VM-Series firewalls are now available for Oracle Cloud Infrastructure (OCI). You can protect and segment your workloads, prevent threats and improve visibility into your applications as you move to OCI.

Secure Kubernetes Services within a GKE Cluster

Use the Panorama plugin for GCP to secure inbound and outbound traffic for a service that is externally accessible.

VM Monitoring on AWS

Use the Panorama plugin for AWS to monitor your virtual machine workloads on up to 100 VPCs on the AWS public cloud.

Spotlight

Book Image

Palo Alto Networks Receives Google Cloud Innovative Solution in Security Award

Transit VNET architecture with the VM-Series on Azure


Book Image

Deployments Supported on Azure

Documentation

VM-Series Deployment Guide


The Palo Alto Networks VM-Series firewall is the virtualized form of the Palo Alto Networks next-generation firewall. Use the VM-Series firewall deployment guide to learn how to secure your protect apps and data in virtualized data center, private cloud, and public cloud deployments.

Data Center Best Practice Security Policy


Your enterprise's most valuable assets reside in your data center, including proprietary source code, intellectual property, and sensitive company and customer data. Your customers and employees trust you to maintain the confidentiality and integrity of their data and expect that data to be always available, so it's important to implement a data center best practice security policy that safeguards your data and prevents successful attacks. Use the guidelines in this site to plan, deploy, and maintain your data center best practice security policy.

PAN-OS® Release Notes


Thinking about upgrading your next-gen firewalls and Panorama to PAN-OS 9.0? Before you begin, make sure you review the release notes to learn about known issues, issues we've addressed in the release, and changes in behavior that may impact your existing deployment.

Videos

Lightboard Series: VM-Series on Google Cloud Platform Overview

A quick summary of the different ways in which you can deploy the VM-Series next-generation firewall on Google Cloud Platform to protect your applications and data.

Delivering Automation with PAN-OS 8.0 Logging Features

Utilizing the great new features of 8.0 to offer some great automated responses directly from the firewall, namely, Filtered log forwarding, HTTP log forwarding, and Auto-tagging.

Lightboard Series: Scale Out Architectures for the VM-Series on Azure

A brief overview of how you can use Azure Load Balancers to assemble scalable VM-Series architectures on Azure including: (1) achieving managed scale for inbound traffic; (2) delivering outbound scale while protecting workloads from lateral (east-west) threat movement and (3) deploying a shared service architecture that centralizes security and connectivity.

Lightboard Series: Firewall Services VPC Integration

This Lightboard discusses how to integrate the VM-Series next-generation firewall into an AWS Services VPC architecture as a means of addressing security for an environment with many VPCs.

Lightboard Series: Autoscaling GlobalProtect in AWS

This Lightboard video is an overview on how to automatically scale GlobalProtect remote access solution up and down to meet real time demand while reducing costs.

Lightboard Series: VM-Series for Azure Overview

Overview of the VM-Series for Azure deployed in a hybrid scenario, securely extend your data center to Azure.

Related Documents

Best Practices


At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and Panorama, create best practice security policy to safely enable application access at the internet gateway and the data center, or learn the best way roll out a decryption policy to prevent threats from sneaking into your network, you will find the guidance you need here in our best practice documentation. And, our best practice library keeps growing and evolving to keep up with the ever-changing threat landscape, so be sure to check back often!

Firewalls & Appliances


Palo Alto Networks® next-generation firewalls detect known and unknown threats, including in encrypted traffic, using intelligence generated across many thousands of customer deployments. That means they reduce risks and prevent a broad range of attacks. For example, they enable users to access data and applications based on business requirements as well as stop credential theft and an attacker’s ability to use stolen credentials.

RedLock & Evident


Evident Service from Palo Alto Networks brings speed, scale, and efficiency to public cloud security monitoring and compliance validation. The service offers an agentless, API-based integration that combines detection and analysis of misconfigurations, vulnerabilities, and risk, with a global view and the actionable intelligence you need to rapidly remediate and secure your entire public cloud infrastructure. Use the Evident service to ensure adherence to security best practices and make compliance ongoing in the public cloud shared responsibility model.